View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Software
March 12, 2009

Hosted ID services to take 20% share by 2011

ID-aware networks on cards says Gartner

By CBR Staff Writer

Gartner has today pointed the way forward for the identity and access management (IAM) sector with a set of predictions it expects to shape the market between now and 2011.

The analyst house has taken a strong line on the role of hosted identity services saying that by 2011, hosted IAM and IAM delivered as a software service will account for 20% of vendor revenues.

“A growing percentage of the revenue realised by IAM vendors and service providers will be made possible by the next step in the IAM maturity model, toward hosted IAM and IAM as a service” it said.

Not every vendor will accept every aspect of the latest market assessment, however. 

Mike Small, lead security consultant at CA said that while vitally important, he accepts that IAM is not a core competency and hosting does offer a massive opportunity to reduce expenditure. But he cautions, “While you can outsource some of the technology and process to do with managing identities, you cannot outsource full responsibility”.

“Approval and attestation of access rights – about who should have which rights to perform which tasks – must remain in house” Small said.

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

Identity-aware networking for the enterprise is another forecast that has been chalked up for development, as a means of blocking access to resources that a user is not authorised to use. 

Gartner reckons that monitoring user behaviour and enforcing access based on a user’s identity is a better approach to safeguarding networked assets than current IP address controls. 

“By 2011, 30% of large corporate networks will become ‘identity aware’ by controlling access to some resources via user-based policies.”

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU